HackNotice launched phishing capabilities to empower users

HackNotice has launched continuous phishing functionality to assist firms to achieve cybersecurity compliance by educating staff about phishing and social engineering attacks. HackNotice’s phishing assists individuals in understanding and recognizing the many forms of attacks that threat actors can use. Writing, sending, and reviewing phishing campaigns may be a time-consuming procedure for the security team, especially when pricey phishing platforms leave a lot to be desired. 

Steve Thomas, CEO of HackNotice commented, “Social engineering attacks are rampant, and this is after the fact that security awareness training and phish testing are mandatory programs people must enroll in at work. However, the problem is that these programs are compliance-focused instead of people-focused. 

Our new phishing capability not only helps companies get to compliance, but it also opens up the conversation about phishing and helps people to understand how phishing is tied to overall threat awareness.” 

HackNotice’s phishing can be implemented with the click of a mouse, enabling people to identify phishing emails and determine what measures to do if they receive them. While HackNotice currently assists employees in identifying dangerous conduct, increasing security awareness, and monitoring, measuring, and managing employee progress, the latest component assists businesses in developing a comprehensive strategy to battle cyber threats

Phishing is covered in the current service for clients who use HackNotice to defend their firm. The new feature includes dynamic phishing emails and landing sites, open and clicks tracking, and more dashboards and analytics to help you evaluate how your staff is progressing. 

BigID announces data deletion capabilities!

BigID, a leading data intelligence platform that enables businesses to understand their enterprise data and take action for privacy, security, and governance, today unveiled native data deletion capabilities that make it simple for businesses to swiftly and effectively delete sensitive and personal data from all of their data stores, including Snowflake, AWS S3, mySQL, Google Drive, Teradata, and others. 

Additionally, customers may use this new application to reduce attack surfaces, enhance data security posture, and comply with a number of privacy regulations while taking the required precautions to safeguard their data. 

BigID CISO Tyler Young  said, “Data deletion is typically an ‘I’ll do that later’ project – but as data volume explodes, it’s more critical than ever to be able to delete the right data at the right time – from the right systems and storage. BigID’s data deletion app changes the game, enabling data lifecycle management in a single platform so that companies can minimize their attack surface, achieve compliance, and improve their data hygiene.” 

Benefits of BigID’s data deletion are as follows: 

-          Accelerate data minimization initiatives  
-          Reduce cloud data risk  
-          Fulfill data deletion requests  
-          Initiate data deletion  

With BigID’s data intelligence platform organizations can learn about their company data and take action for privacy, security, and governance. BigID is used by customers to proactively find, manage, safeguard, and maximize the value of their regulated, sensitive, and personal data across their entire data environment. 

Read More : Cyble Partners With VirusTotal for Cybersecurity

Delinea released DevOps Secrets Vault enhancements

Delinea released the most recent version of its high-speed vault for DevOps and DevSecOps teams, DevOps Secrets Vault. In an effort to speed up development and increase visibility, the newest Mac computers are now supported for development and automation for improved secret management usability.  

Jason Michell, SVP of Engineering at Delinea “The exponential growth of machine identities as applications are modernized and architected as micro-services continues to place organizations at increased risk. Delinea’s ongoing focus on making security seamless for developers is reflected in these recent enhancements, enabling them to use DevOps Secrets Vault to dynamically insert credentials in their code, in line with security best practices.” 

For developers using Macs, it offers expanded support with the addition of support for the M1 chip, developers writing code on the most recent Macs can now take advantage of the command line interface (CLI) and DSV Engine (an agent supporting database dynamic secrets) of DevOps Secrets Vault. Delinea continues to remove the friction that frequently occurs when securing sensitive secrets and credentials, particularly in hectic DevOps environments, by building on its focus on seamless usability. 

The friction between DevOps teams is constantly being reduced. Continuous usability and flexibility improvements are made to both the CLI and the graphical interface, enabling developers to work without interruption in their preferred interface with their preferred tools and assisting businesses in lowering the risk of credentials being compromised. 

In both interfaces, new features have been added, for improved Security Information and Event Management (SIEM) functionality support along with an approved ansible plugin for use with ansible automation Hub and additional authentication techniques. 

Authomize expanded its REST API framework

Authomize announced the expansion of its REST API framework to enable customers to build their own custom connectors to their cloud and homegrown applications and services in a couple of hours. With the help of Authomize’s Software-as-a-Service (SaaS) solution, businesses can automatically secure access rights across every cloud service they use, including IaaS, SaaS, and IAM solutions. 

Guy Katzir, Head of Product at Authomize stated, “Authomize’s exceedingly granular connectors allow us to provide in-depth visibility into the most complex IAM permission models, including users, groups, roles, access privileges, assets, and activity. Our ability to map and understand the hierarchy structures within assets and groups gives customers the fine-grained insights they need to apply the most effective identities and access security controls and perform the most thorough incident investigations. 

We are already seeing customers using the REST API to build integrations to Coupa, Workday, Zuora, Chef, NetSuite, and Tenable.io. and more. They are using these connectors to get the same high level of IAM permission modeling and depth of visibility value that we provide for our native connectors. Our new framework enables them to perform all functions they look to Authomize for, from running accurate streamlined User Access Reviews to enforcing security policies with continuous monitoring.” 

Authomize can ingest, normalize, and analyze identity and access data from any cloud, on-premises, or custom application or service by using native connectors, REST APIs, SCIM connectors, and a file uploader. Using this data as a foundation, Authomize can gain deep insights into the efficient access paths that would otherwise be hidden by the proliferation of IAM structures and siloed environments across multiple clouds. To enable users to connect more of their applications and services with the same level of granularity and coverage as the native connectors, Authomize has just released a new version of its API. 

Businesses can integrate Authomize with every component of their security infrastructure, including the top SIEMs, SOARs, and ITSMs, using the new REST API. 

Along with the recently released APIs, users can now take advantage of new webhook functionalities to automate access privilege revocation directly through Okta, send alerts to security orchestration tools like Microsoft Sentinel, and open tickets in ServiceNow and Jira, enhancing the value of the rest of their tooling ecosystem with Authomize’s identity and access data enrichment. 

Authomize has expanded its integrations by including Identity Providers (IdPs) OneLogin and JumpCloud, as well as Bamboo HR and Delinea’s Secret Server, which will enable them to track users between Secret Server and AWS, assisting clients in locating stale accounts and secrets. 

Read More : API Security Should Be Your Priority in 2022

Phosphorus partnered with Dewpoint to Expand Its xIoT Security Solutions

Phosphorus partnered with Dewpoint to provide value-added reseller (VAR) services for Phosphorus in the US. Dewpoint, an IT, and security solutions provider will jointly deliver a new generation of xIoT security solutions in the US to meet growing enterprise demand for xIoT attack surface management and remediation capabilities. 

Kal Gajera, Director of North America Channels at Phosphorus commented, “xIoT security is a critical need for today’s enterprises, and these risks are left unaddressed by traditional IT security solutions. We look forward to working with Dewpoint to help expand our US sales channels and bring the world’s most advanced xIoT security platform to more organizations.” 

The Extended Enterprise xIoT Security Platform from Phosphorus is an automated security platform that can provide xIoT Attack Surface Management, xIoT Hardening, and Remediation, and xIoT Detection and Response for the entire range of IoT, OT, and Network-connected devices, including both new and legacy devices. 

This enables big businesses to scale xIoT technologies (which can result in millions of devices per organization) without having to hire more staff to locate, maintain, and keep an eye on them. 

Phosphorus Cybersecurity® is xTended Security of ThingsTM platform created to protect the rapidly expanding and frequently unmonitored Things throughout the enterprise xIoT landscape. Its extended enterprise xIoT Security Platform offers attack surface management, hardening & remediation, and detection & response to extend enterprise xIoT security to all cyber-physical things in your enterprise environment. Phosphorus automates the remediation of the largest IoT, OT, and network device vulnerabilities, including unknown and inaccurate asset inventories, outdated firmware, default credentials, risky configurations, and out-of-date certificates. 

Commvault launched Metallic ThreatWise

Commvault  launched Metallic ThreatWise, an early warning system that proactively surfaces unknown and zero-day threats to minimize compromised data and business impact. According to Enterprise Strategy Group, only 12% of the IT directors polled expressed confidence in having the necessary tools and location-neutral security to equally secure data both on-premises and in the cloud. 

Jon Oltsik, Senior Principal Analyst and Fellow at Enterprise Strategy Group stated, “In surveying enterprise IT directors with direct knowledge and influence on their company’s data security strategies, the results we found were eye-opening. It is very clear that many IT teams do not have adequate tools in place to detect ransomware attacks on production environments early enough in the attack chain to neutralize stealthy cyber-attacks before they cause harm. Ransomware has revolved around encryption for a long time, but newer extortion techniques like exfiltration go beyond rapidly spreading malware, and data recovery alone cannot help if sensitive business data is leaked to the Dark Web.” 

ThreatWise from Commvault adds an early warning system that no other vendor in this market offers, further defining data security. It employs decoys to foresee threats in production environments, lure malicious actors into using fake resources and equip businesses with tools to protect data. In addition, Commvault is expanding the capabilities of its wider platform, which is already available, in terms of machine learning, critical threat detection, and security. 

Ranga Rajagopalan, Senior Vice President, Products, Commvault commented, “Data recovery is important, but alone it’s not enough. Just a few hours with an undetected bad actor in your systems can be catastrophic. By integrating ThreatWise into the Metallic SaaS portfolio, we provide customers with a proactive, early warning system that bolsters their zero-loss strategy by intercepting a threat before it impacts your business.” 

DartPoints launched an enhanced MDR product

DartPoints launched an updated managed detection and response (MDR) product. The product combines MDR, endpoint detection and response (EDR), extended detection and response (XDR), and security orchestration, automation, and response (SOAR) into one complete solution with support and monitoring by DartPoints experts. 

Brad Alexander, CTO for DartPoints “Executives and security leaders know they need a multi-layered cybersecurity strategy that combines MDR, EDR, SOAR, and XDR solutions, but increasingly, they don’t have the in-house resources to make that happen. Plus, with the hundreds of tools and providers on the market, analysis paralysis sets in. We are proud to help our clients by bringing these best-in-class security vendors and technologies together into one comprehensive, airtight solution.” 

The prevalence of ransomware and other cybersecurity incidents makes it more important than ever to have a solution that can quickly identify threats across endpoints, networks, clouds, and SaaS applications. 

The enhanced MDR offering from DartPoints addresses a number of flaws in traditional antivirus and security solutions, including the exorbitantly high number of alerts and false positives. The solution is designed for high-risk, compliance-sensitive verticals like finance, government, manufacturing, education, and healthcare. It offers advanced threat detection, continuous threat hunting, 24-hour monitoring, and investigations. 

The improved product will be especially helpful to organizations with compliance, standard, or framework requirements, those looking to purchase or renew cyber insurance, and those without their own security operations center. 

An average of 270 cyberattacks per company are expected in 2021, up 31% from the year before, according to a global survey of nearly 4,800 executives, as detailed in Accenture’s State of Cybersecurity Resilience 2021 report. Ransomware attacks, meanwhile, nearly doubled in 2021. According to IBM’s most recent Cost of a Data Breach Report, in 2022 the average cost of a data breach will reach a record high of $4.35 million. 

ThreatQuotient introduces New ThreatQ TDR Orchestrator Features!

ThreatQuotient announced a new version of ThreatQ TDR Orchestrator, which is known to be the industry’s first solution for a simplified, data-driven approach to security operations. The expanded automation, analysis, and reporting capabilities of ThreatQ TDR Orchestrator speed up threat detection and response across several platforms. 

Leon Ward, Vice President of Product Management at ThreatQuotient stated that “Leveraging automation to do the heavy lifting and cut through the noise is vital to helping cybersecurity teams thrive under pressure. ThreatQuotient continues to innovate in a way that drives meaningful operational benefits to customers. Many process-based SOAR platforms are designed such that only security engineers and analysts have the skills necessary to use them directly; making these traditional platforms hard to implement and maintain which drives higher costs over time. This ThreatQ TDR Orchestrator release reinforces the need for no-code solutions that empower operators to adapt to dynamic threat landscapes faster and focus their energy on security operations workflows that provide critical business context.” 

ThreatQuotient’s most recent study, whose complete release is scheduled for later in 2022, reveals indications that security automation adoption is progressing as 98% of businesses increase their budgets in this area. The study also shows that firms are more confident in automation itself, with over 88% of businesses expressing some level of confidence in the results of automation, up from only 59% the year before. However, 98% of respondents claim that implementation issues plagued them. ThreatQuotient has prioritized the development of ThreatQ TDR Orchestrator to enable more effective operations that can be directly measured by time savings and FTEs gained, improved risk management, and easier-to-use security automation solutions that are less expensive than traditional automation tools and learn over time. 

The latest version of ThreatQ TDR Orchestrator provides the following benefits: 

  1. Prioritize automation on the most important events/alerts 
  1. Playbooks are easier to maintain  
  1. Less training is required upfront  

iBASIS partners with jtendo to protect signaling networks

iBASIS  and jtendo have partnered to integrate the multi-protocol signaling firewall of jtendo to iBASIS Security iQ360, managed cloud-based security portfolio. To monitor, analyze, detect, and prevent security breaches, it is necessary to use advanced testing features and cross-protocol correlation due to the growth in network protocols (including those for 5G) and technologies, as well as roaming traffic. 

Piotr Szymański, CEO of jtendo stated, “We are very proud to partner with one of the largest international signaling, voice, and data networks and complement iBASIS’ 360-degree intelligence-based solution. Mobile operators are increasingly searching for threat management that continuously adapts to their ever-changing network landscape, offering a flexible managed solution hosted on the IPX network is an effective way to secure their signaling network as an ongoing process. We are always there to support our customers in keeping their network safe in all areas.” 

The strategic alliance brings together the global and managed cloud-based expertise of iBASIS with the security audit experience, in-depth technical knowledge of telco protocols, and cross-protocol correlation expertise of Jtendo. 

The iBASIS Security iQ360 platform gives MNOs process automation to identify security risks and address vulnerabilities. In-depth visibility, monitoring, and attack detection are the foundation of the solution, which also includes automatic rule updates for protection against continuously evolving threats. 

Guillaume Klein, iBASIS Vice President of Product Management expressed, “The growing threat trend around today’s telecom networks drives the need for innovative security management solutions that can adapt quickly to new threats. We are thrilled to collaborate with jtendo to achieve effective threat management and be able to leverage their unique auditing and multiprotocol expertise to raise the level of protection even further.” 

Read More : Cloud Security; concerns, and safety

Phosphorus announces partnership with EverSec Group!

Phosphorus announced a collaboration with EverSec Group to expand IoT attack surface management. In order to fulfill the growing enterprise need for xIoT attack surface management and remediation capabilities, the two companies will jointly deploy a new generation of xIoT security solutions in the United States under the new alliance.  

“This exciting collaboration with a proven solution provider will allow us to expand our footprint and deliver cutting-edge xIoT security to more companies across the U.S.,” said Obbe Knoop, Chief Revenue Officer of Phosphorus. “EverSec’s proven expertise in the emerging security landscape is of great value to us as we gear up for record growth this year.” 

The world’s first and only automated security platform, Phosphorus’ Extended Enterprise xIoT Security Platform offers xIoT Attack Surface Management, xIoT Hardening and Remediation, and xIoT Detection and Response to the full spectrum of IoT, OT, and Network-connected devices, including both new and legacy devices. This makes it possible for big businesses to scale xIoT technologies—often millions of devices per business—without needing to hire more staff to safeguard them. 

About Phosphorus and EverSec Group! 

Phosphorus Cybersecurity, the foremost xTended Security of ThingsTM platform was created to secure the constantly expanding and frequently unmonitored Things across the enterprise xIoT environment. In order to provide enterprise xIoT security to every cyber-physical Thing in the company environment, the Extended Enterprise xIoT Security Platform offers Attack Surface Management, Hardening & Remediation, and Detection & Response. 

Around 200 clients wherein most of them are the biggest brand names in the world, rely on EverSec Group as their trusted security expert. To secure the security of its targeted environments, EverSec assists the Network/Infrastructure Security, Cyber, IR, InfoSec, and Security Operations Center teams across those customers. 

Read More : The definitive guide to IoT security best practices